Trey Gowdy says Hillary's team used an open source program called BleachBit to wipe her servers. Anybody here using it?

What I don't get is I heard they recovered some emails, but also that they were shredded this way. Did the Feds actually reconstruct emails from a wiped drive? I know supposedly they've got ways of doing it by detecting minute electromagnetic imprints but it just seems impossible if you did like a random-number fill multiple times. Anyway I've never used that one, I've used both Eraser (for single files) and DBAN (for whole disks). I think they all work mostly the same way although there are different algorithms to choose from.

Btw anyone know whatever happened to TruCrypt? Back in the day it was claimed the encryption was so solid that if you got rid of an encrypted drive you needn't even bother erasing it. Was it replaced by something else?

What I don't get is I heard they recovered some emails, but also that they were shredded this way. Did the Feds actually reconstruct emails from a wiped drive? I know supposedly they've got ways of doing it by detecting minute electromagnetic imprints but it just seems impossible if you did like a random-number fill multiple times. Anyway I've never used that one, I've used both Eraser (for single files) and DBAN (for whole disks). I think they all work mostly the same way although there are different algorithms to choose from.

Btw anyone know whatever happened to TruCrypt? Back in the day it was claimed the encryption was so solid that if you got rid of an encrypted drive you needn't even bother erasing it. Was it replaced by something else?

I think the emails they got were ones that had been sent to other people or from other people. Then they went to those computers and retrieved copies. i.e They looked at Huma's account and found emails that were either to: cc: or from: HRC. Hence the ones to and from "Diane Reynolds" the alias HRC used for Chelsea.

If people were using an email program like Outlook on their PC, wiping the server or deleting emails on the server, would not have deleted copies stored locally on a PC.

What I don't get is I heard they recovered some emails, but also that they were shredded this way. Did the Feds actually reconstruct emails from a wiped drive? I know supposedly they've got ways of doing it by detecting minute electromagnetic imprints but it just seems impossible if you did like a random-number fill multiple times. Anyway I've never used that one, I've used both Eraser (for single files) and DBAN (for whole disks). I think they all work mostly the same way although there are different algorithms to choose from.

Btw anyone know whatever happened to TruCrypt? Back in the day it was claimed the encryption was so solid that if you got rid of an encrypted drive you needn't even bother erasing it. Was it replaced by something else?

In theory, I guess, with unlimited computing and lots of power some agency could reverse CCleaner, BleachBit etc because of some vunerablities in the algorithm used in the 'random' number generators? But I would think hard to do. Also with the size of harddrives and servers and clouds I would think to really 'erase' something one would need to wipe ALL the drives and several times with the 'random' numbers which, in some cases now, would take a long time. Not sure how physical destruction (magnets, fire, acids, etc could be recovered but apparently there are companies/agencies who can recover stuff that a layman would think 'no way.' Having said that I would've thought, at this point, that once the packets are sent 'out there' through the interwebs that some agency has recorded them so that even if you bleach your personal PC they would still have a record of the traffic?

Btw anyone know whatever happened to TruCrypt? Back in the day it was claimed the encryption was so solid that if you got rid of an encrypted drive you needn't even bother erasing it. Was it replaced by something else?

All OSs: Support Japanese encryption standard Camellia, including for Windows system encryption (MBR & EFI). Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption.

So, if she kept her (30,000) emails in a special folder on her server then yes, she could have wiped them w/ BleachBit. As far as recovery goes, if she wiped the free space also, magnetic resonance recovery (expensive) would have to be used to get those emails back, and it would be iffy if you could even recover them. BleachBit is kind of like the dd command, recovery is not guaranteed, or in some cases, even possible.

...Btw anyone know whatever happened to TruCrypt? Back in the day it was claimed the encryption was so solid that if you got rid of an encrypted drive you needn't even bother erasing it. Was it replaced by something else?

Truecrypt got shut down by constant litigation I think. (Guess who.) To answer your question, yes, by Vericrypt. There is some speculation about vericrypt being backdoored and a lot of peeps are still running the last version (7.1 I think) of truecrypt because of that.

So, if she kept her (30,000) emails in a special folder on her server then yes, she could have wiped them w/ BleachBit. As far as recovery goes, if she wiped the free space also, magnetic resonance recovery (expensive) would have to be used to get those emails back, and it would be iffy if you could even recover them. BleachBit is kind of like the dd command, recovery is not guaranteed, or in some cases, even possible.

I guess the final verdict will come in when the below mentioned independent audit is performed, insofar as we can trust any third party determination.

To decrease the possibility of any meddling and only after the audit, it would be best to compile the source yourself rather than download the binary. No real way to do a dependable 'diff' on the compiled code, given the makefile options, different OS platform dependencies and various compilers that can be used (the shared .so and .dll files alone will vary appreciably between versions of even the same OS).

"An independent code audit of VeraCrypt is currently in the initial planning stage.[27]

VeraCrypt is based on the source code of TrueCrypt, which passed an independent security audit. Phase I of the audit was successfully completed on 14 April 2014, finding "no evidence of backdoors or malicious code."[28] Phase II of the audit was successfully completed on 2 April 2015, finding "no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances."[29][30]"

Any active Application Developers here ?I just came across a nice little 'ware that bakes multi-factor authentication into your application or program. Free for up to 100 users. Perfect if you're on Dev team and want to test drive it. Limitations:"Basically you start free and you can test the application with up to 100 of your users. Once you pass that mark, use custom notifications or you want to generate users' encryption keys, we'll ask you to upgrade. If you need more users, you can purchase later in batches of 100. Custom mobile apps however are not free. " <-- My Bold.

Be Aware; their API servers are in Germany and their domain is registered in the UK. Their webpage runs through the Amazon servers out of Seattle. Nothing to worry about, this is normal, just be aware.

Interesting. I wonder if they have tested any Bene Gesserit. Seriously though, it would be intriguing to see the results of a Yogi or someone else that has actively practiced calming of the mind. Good articles BTW. Thanks.

I'm wondering if WinXP is still viable. My sister bought a computer that didn't come with an OEM copy of Win7, and the hard drive died. So, after getting a new HD, she has to buy Windows 10, which would cost about $100. I put Linux on it, but she wants nothing to do with it. Only thing else I can do is install XP. Anyone still running that? Is it safe?

i'm late replying to this. i could send you a disc image of legit windows 7 which will work with the product key on the outside of the computer. or, you could download windows 10 and install it using that same win7 product key.

Beyond the usual updates to external dependencies such as Wine and UniATA, much work has gone into refining the experience of using ReactOS, especially with respect to the graphical shell and the file explorer. Perhaps the most user visible change however is the ability now to mount and read from several Unix filesystems, namely ext family, ReiserFS, and UFS. Native built-in support for these filesystems should make for considerably easier interoperability than the current out-of-box experience provided by Windows, and there is more to come in the future.https://reactos.org/project-news/reactos-042-released

--there is no spoon, only bacon.

i've been paying attention to this project for a few years now. always improving. i hope to be able to use it as my primary OS one day.

i'm late replying to this. i could send you a disc image of legit windows 7 which will work with the product key on the outside of the computer. or, you could download windows 10 and install it using that same win7 product key.

More to the analog kid:I installed in a crappy laptop from what I can figure is the easiet Linux (something called Linux Mint Mate) and it works great and is pretty much like XP in terms of look and file system (but you can still do other command line stuff if you wish) but otherwise pretty much the same. And anything you want to do with Windows (Excel, Word, STFP, internet browsing) you can do and find free versions of the Microsoft stuff. Then again, I still like XP and run it on another computer but never use either for any business or banking stuff because, I'm told, "no support" but using freeware on the XP and constantly cleaning, scanning, etc I haven't seemed to have any issues? I turn off when not using and even turn off my router when not using but, who knows. Nothing to my knowledge stolen, hacked, or compromised---- except some letter I got from the US government that they were hacked. And I never worked there but since my dad did, decades ago, my stuff might have been stolen! And they want to make MORE government databases and mine us!?

Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence - sourcesYahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

Back when there was a BellSouth, it turned its email service over to Yahoo - even though accounts kept the bellsouth domain. I don't know if the rest of ATT did this, but the scanning could be more widespread than just Yahoo accounts.